End-point Security

The power of real-time capabilities for communication service providers
A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the ...

Examples of Large & Small Business Cyber Attacks: Fighting for Survival Against a New Wave of Cyber Criminals
There are two types of businesses in the world today. Those that have been attacked by cybercriminals, and those that haven’t, yet. In what is becoming increasingly clear, most of these businesses ...

How European telecoms defend their customers from the latest cybersecurity threats
Have you seen the latest cyberthreat report? The numbers are mind-boggling! Our data show that Allot’s network security services blocked cyberthreats from harming European subscribers 653,996,978 times in the first half of ...

DDoS attacks and 5G: everything you need to know
Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of ...
Countering Cybercrime in the Next Normal
Guest post By Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon BlackCOVID-19 has reshaped the global cyberthreat landscape. While cyberattacks have been on the rise, the surge in frequency and increased threat ...

The Rise of Phishing Attacks: P.S. ILoveYou
In This Issue: "The Rise of Phishing Attacks: P.S. I Love You". IILOVEYOU. Did you ever receive an email with that subject line? Millions did in May 2000. It was a game ...

How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines
Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half ...

Why CSPs Should Care About Phishing
Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to ...

Brute Force Attacks on IoT – Here to Stay?
IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...

10 Ransomware Attacks You Should Know About in 2019
Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019 ...